Skip to content

Commit 5547b3b

Browse files
committed
linter fixes
1 parent 7ad480a commit 5547b3b

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

modules/guides/pages/enabling-verification-of-image-signatures.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,4 +94,4 @@ There's a lot more to learn about how keyless signing and verification works. We
9494
* https://docs.sigstore.dev/signing/overview/
9595
* https://docs.sigstore.dev/policy-controller/overview/
9696
* https://www.chainguard.dev/unchained/life-of-a-sigstore-signature
97-
* https://blog.sigstore.dev/why-you-cant-use-sigstore-without-sigstore-de1ed745f6fc/
97+
* https://blog.sigstore.dev/why-you-cant-use-sigstore-without-sigstore-de1ed745f6fc/

modules/guides/pages/viewing-and-verifying-sboms.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,4 +77,4 @@ kubectl label namespace stackable policy.sigstore.dev/include=true
7777
----
7878

7979
The Policy Controller checks all newly created Pods in this namespace that run any image matching `+++**+++.stackable.tech/+++**+++` (this matches images provided by Stackable) and ensures that these images have an attested SBOM that's been signed by a Stackable Github Action. If no SBOM is present or its signature is invalid or missing, the policy will deny the pod creation.
80-
For a more detailed explanation of the policy options, please refer to the https://docs.sigstore.dev/policy-controller/overview/#configuring-image-patterns[Sigstore documentation].
80+
For a more detailed explanation of the policy options, please refer to the https://docs.sigstore.dev/policy-controller/overview/#configuring-image-patterns[Sigstore documentation].

0 commit comments

Comments
 (0)